Last revised: January 2026
ITSP.10.171 Compliance Statement
Protecting Specified Information in Non-Government of Canada Systems and Organizations
DataPeak’s SaaS architecture, operational controls, and security governance are designed to align with the requirements defined in ITSP.10.171, published by the Canadian Centre for Cyber Security.
ITSP.10.171 provides guidance for protecting specified information—the Canadian analogue to U.S. Controlled Unclassified Information (CUI)—when handled by non-Government of Canada (non-GC) systems and organizations.
This page outlines how DataPeak supports federal departments, agencies, and contractors by aligning with the 17 ITSP.10.171 control families and enabling customers to meet confidentiality-focused safeguarding requirements.
1. Scope & Applicability
ITSP.10.171 applies to non-GC systems that handle, process, store, or transmit specified information, including systems that protect or support those components.
DataPeak supports alignment by providing a secure, multi-tenant SaaS platform with strong technical, administrative, and architectural safeguards.
This alignment applies to:
DataPeak systems that may process or store specified information
Underlying cloud infrastructure and inherited security controls
Operational processes that protect confidentiality and integrity
Customer-configurable security and access controls
Customers remain responsible for:
Proper classification of specified information
Configuration of identity providers and access policies
Definition of organization-defined parameters (ODPs)
Appropriate use of DataPeak’s security features
2. Summary of Alignment Across ITSP.10.171 Control Families
ITSP.10.171 Control Family
Access Control (AC)
Awareness & Training (AT)
Audit & Accountability (AU)
Configuration Management (CM)
Identification & Authentication (IA)
Incident Response (IR)
Maintenance (MA)
Media Protection (MP)
Personnel Security (PS)
Physical Protection (PE)
Risk Assessment (RA)
Security Assessment & Monitoring (CA)
System & Communications Protection (SC)
System & Information Integrity (SI)
Planning (PL)
System & Services Acquisition (SA)
Supply Chain Risk Management (SR)
3. Detailed Alignment by Control Family
3.1 Access Control (AC)
DataPeak enforces access controls consistent with ITSP.10.171 requirements for account management, access enforcement, least privilege, and session control.
SSO via SAML and OIDC
Mandatory MFA for privileged roles
Role-based access control (RBAC)
Device trust and IP allowlisting
Automatic session timeouts
Logging of privileged actions
Outcome: Only authorized users, devices, and processes can access specified information.
3.2 Awareness & Training (AT)
Annual security awareness training
Role-based training for engineering and operations
Phishing simulations
Insider-threat awareness
Outcome: Personnel understand their responsibilities for protecting specified information.
3.3 Audit & Accountability (AU)
Authentication, authorization, and data access logging
Immutable log storage
SIEM integration
Timestamp integrity and alerting
Outcome: Unauthorized activity can be detected and investigated.
3.4 Configuration Management (CM)
Infrastructure-as-Code (IaC)
Hardened OS and container baselines
Change control workflows
Configuration drift detection
Outcome: Systems remain secure, consistent, and auditable.
3.5 Identification & Authentication (IA)
MFA enforcement
Device authentication
OAuth2 for API access
Passwordless authentication options
Replay-resistant mechanisms
Outcome: Only authenticated users and devices gain access.
3.6 Incident Response (IR)
24/7 on-call security team
Documented incident response plan
Incident monitoring and reporting
Tabletop exercises
Customer notification SLAs
Outcome: Incidents are rapidly detected, contained, and communicated.
3.7 Maintenance (MA)
Secure remote maintenance
Logged and monitored sessions
Pre-approved maintenance windows
Vendor access restrictions
Outcome: Maintenance activities do not compromise confidentiality.
3.8 Media Protection (MP)
No removable media usage
Encrypted storage
Secure deletion and sanitization
Outcome: Specified information is protected from unauthorized disclosure.
3.9 Personnel Security (PS)
Background checks
Role-based access provisioning
Automated offboarding
Privileged access reviews
Outcome: Only trusted personnel access sensitive systems.
3.10 Physical Protection (PE)
Inherited cloud provider controls include:
24/7 surveillance
Multi-factor physical entry
Redundant power and cooling
Physical access logging
Outcome: Physical access is tightly controlled.
3.11 Risk Assessment (RA)
Annual risk assessments
Vulnerability scanning
Threat modeling
Risk response planning
Outcome: Risks are identified and mitigated.
3.12 Security Assessment & Monitoring (CA)
Annual penetration testing
Continuous monitoring
POA&M tracking
Security assessments
Outcome: Control effectiveness is maintained and improved.
3.13 System & Communications Protection (SC)
TLS 1.2+/1.3 encryption in transit
AES-256 encryption at rest
Network segmentation
WAF and DDoS protection
Key management services
Outcome: Confidentiality is preserved during transmission and storage.
3.14 System & Information Integrity (SI)
Flaw remediation and patching
Malware protection
Runtime monitoring
Security alerting
Outcome: Threats are detected and remediated quickly.
3.15 Planning (PL)
Security policies and procedures
System Security Plans (SSPs)
Rules of behaviour
Architecture and data flow documentation
Outcome: Security planning is structured and documented.
3.16 System & Services Acquisition (SA)
Secure SDLC practices
SBOM generation
Dependency scanning
Supplier vetting
Outcome: Systems are securely designed and procured.
3.17 Supply Chain Risk Management (SR)
Vendor risk assessments
Contractual security requirements
Continuous monitoring of critical suppliers
Cloud provider inheritance
Outcome: Supply chain risks are controlled and monitored.
4. Shared Responsibility Model
Area
Platform security
Infrastructure security
Identity provider configuration
Access policies
ODP definition
Data classification
Logging & monitoring
Logging & monitoring
DataPeak Alignment Summary
SSO, MFA, RBAC, least privilege, session controls, device trust
Annual training, secure-coding education, phishing simulations
Centralized logging, immutable storage, SIEM integration
Infrastructure-as-Code, hardened baselines, drift detection
MFA, OAuth2, device authentication, passwordless options
24/7 IR program, runbooks, tabletop exercises
Secure remote maintenance, logged sessions, vendor controls
No removable media, encrypted storage, sanitization
Background checks, role-based access, automated offboarding
Inherited cloud provider physical controls
Annual risk assessments, vulnerability scanning
Continuous monitoring, penetration testing, POA&M tracking
TLS 1.2+/1.3, encryption at rest, segmentation, WAF
Malware protection, patching SLAs, runtime monitoring
Security plans, rules of behaviour, data flow diagrams
Secure SDLC, SBOMs, supplier vetting
Vendor assessments, contractual controls
DataPeak Responsibility
✔
✔
—
Shared
—
—
Shared
✔ (inherited)
Customer Responsibility
—
—
✔
Shared
✔
✔
Shared
—
5. Continuous Improvement
DataPeak continuously enhances its security posture through:
Regular control reviews
Threat intelligence integration
Continuous monitoring
Alignment with ITSP.10.033, NIST SP 800-171, and NIST SP 800-53
6. Documentation & Support
Customers may request additional documentation, including:
Security whitepapers
Architecture diagrams
Penetration test summaries
Data flow documentation
ODP tailoring guidance
Requests can be made through your account representative.
Official Standard References
Canadian Centre for Cyber Security – ITSP.10.171
https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171
Official PDF (v4):
https://www.cyber.gc.ca/sites/default/files/itsp10171-e-v4.pdf
For questions, contact info@factr.me.
You may also view FactR Limited’s Privacy Policy and Terms & Conditions